The biggest issue with bring your own device (BYOD) is security. Security from viruses and hacking…security of student and faculty data…security of the school network. All of these concerns are usually what frighten school administration from implementing BYOD…the security risks are very high.
What makes this point so valid are two major issues that fall under security: student personal information leaks, and security of internal resources from viruses and hacking attacks. (Ullman, 2011)
MAC Address Control
There are several approaches to security that can be taken, the first of which is actually quite simple. The school keeps track of the student devices from their media access control address, or MAC address; and allows students to use their devices in class. The MAC address is unique to every device that accesses the internet all over the world. This allows schools to keep track of who has access to what since the MAC address precedes all signals sent from a computer on a network. (Ullman, 2011)
Segregated Networks
The second option is more robust than tracking MAC addresses, and it involves re-architecting some of the school networks to allow, and that is network segmentation. Basically, a completely separate network is created in the school for the students. The student network has all of their personal file folders and their school applications, and on the other network is where the faculty and staff materials are, along with student records and school records as well. This is a more comprehensive approach since the internet access that students use is different from the internet access that is available to the faculty and staff. (Ullman, 2011)
MAC Address Controlled Segregated Networking
The final option is an amalgamation of the previous two options. Student register their machines on the school networks with the MAC addresses and are then tracked on their own segregated network while they are at school on their own network.
There isn’t a “best” option since every school district is going to be different , and those choices have to be made for each individual case as they arise.
Reference
Ullman, E. (2011). BYOD and Security. Technology & Learning, 31(8), 32-36.
The biggest issue with bring your own device (BYOD) is security. Security from viruses and hacking…security of student and faculty data…security of the school network. All of these concerns are usually what frighten school administration from implementing BYOD…the security risks are very high.
What makes this point so valid are two major issues that fall under security: student personal information leaks, and security of internal resources from viruses and hacking attacks. (Ullman, 2011)
MAC Address Control
There are several approaches to security that can be taken, the first of which is actually quite simple. The school keeps track of the student devices from their media access control address, or MAC address; and allows students to use their devices in class. The MAC address is unique to every device that accesses the internet all over the world. This allows schools to keep track of who has access to what since the MAC address precedes all signals sent from a computer on a network. (Ullman, 2011)Segregated Networks
The second option is more robust than tracking MAC addresses, and it involves re-architecting some of the school networks to allow, and that is network segmentation. Basically, a completely separate network is created in the school for the students. The student network has all of their personal file folders and their school applications, and on the other network is where the faculty and staff materials are, along with student records and school records as well. This is a more comprehensive approach since the internet access that students use is different from the internet access that is available to the faculty and staff. (Ullman, 2011)MAC Address Controlled Segregated Networking
The final option is an amalgamation of the previous two options. Student register their machines on the school networks with the MAC addresses and are then tracked on their own segregated network while they are at school on their own network.There isn’t a “best” option since every school district is going to be different , and those choices have to be made for each individual case as they arise.
Reference
Ullman, E. (2011). BYOD and Security. Technology & Learning, 31(8), 32-36.